Risk
12/20/2011
01:23 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI To Get More Cyber Crime Agents

But is the bureau focusing too heavily on cyberterrorism, as opposed to fighting cybercrime?

The FBI is set to receive more cyber special agents.

According to the draft of the Departments of Commerce and Justice, and Science, and Related Agencies Appropriations Bill for 2012, released earlier this month, the bureau will see increased funding for a number of types of investigations, including computer intrusions and cyber investigations.

That's important, because when it comes to computer intrusions--including foreign intelligence operations that pose a national security threat--"the FBI is in a unique position to counter cyber threats, as it is the only agency with the statutory authority, expertise, and ability to combine counterterrorism, counterintelligence, and criminal resources to neutralize, mitigate, and disrupt illegal computer-supported operations domestically," according to the House committee's appropriations bill.

Accordingly, the committee has recommended that the FBI be granted its full cyber-investigation budget request of $166.5 million, which is an increase of 13% from 2011. That will help the bureau fund 42 new positions, including 14 new special agents with cyber expertise, to "further the FBI's investigatory, intelligence gathering, and technological capabilities."

For comparison's sake, the bureau's budget for investigating national security threats will be $316 million, while the Criminal Justice Information Services Division will receive $645 million. Staffing-wise, the bureau had also requested 367 new positions for fighting white-collar crime, and 20 new positions for handling child exploitation cases.

[ The Obama administration has released a plan to bolster U.S. network security. See White House Sets Cybersecurity R&D Priorities. ]

Out of a workforce that numbers about 30,000 people, the FBI now has cyber squads in each of its 56 field offices across the country, as well as 1,000 specially trained cyber agents, analysts, and digital forensic examiners. "Together, they run complex undercover operations and examine digital evidence. They share information with our law enforcement and intelligence partners. And they teach their counterparts--both at home and abroad--how best to investigate cyber threats," said FBI director Robert S. Mueller in April, when he presented the bureau's budget requests to the House committee.

The FBI has also requested additional funding relating to the Comprehensive National Cybersecurity Initiative (CNCI), and in particular for the National Cyber Investigative Joint Task Force (NCIJTF) that it coordinates. FBI officials want the task force to no longer operate just during business hours.

Of the money being budgeted for the FBI's cyber capabilities, $5 million is to be set aside "for training for FBI cyber agents involved in national security intrusions cases," according to the committee. "This will allow the FBI to increase the number of cyber agents qualified to understand current techniques and tactics used by those engaged in illicit cyber activities, and keep abreast of emerging technologies that are used to overcome computer systems' defenses and to infiltrate networks, such as those of the U.S. government, utility companies, defense contractors, and financial institutions."

The committee said that the need for such funds had been highlighted by an April 2011 report from the Department of Justice office of the inspector general, which found that "36% of FBI field agents assigned to national security-related cyber investigations lacked the expertise, including in networking and counterintelligence, needed to investigate these types of cases and identify those responsible for intrusions." While the bureau will no doubt be thankful for the increased funding, after the audit, FBI officials sharply contested the auditors' findings, saying it presented an outdated picture of the bureau's rapidly improving cyber-investigation capabilities.

Finally, although no money was allocated for the task, the committee said that it also "encourages the FBI to expand its integration of FBI cyber agents into eastern European police services." That's astute, since many cybercrime operations launched against residents of the United States can be traced to Eastern Europe.

But is the FBI's new cybercrime budget sufficient? Law enforcement and risk management consultant Nick Selby, writing on his Police-Led Intelligence blog, said that the funding levels remain "ludicrously low," especially given the frequency with which such crimes are committed. Furthermore, he said, the FBI is the only agency "empowered to battle many types of cyber crime--for example, any cyber criminal act launched from outside the U.S. which attacks U.S. companies or government." In other words, he thinks the bureau needs more money to fight cybercrime.

How 10 federal agencies are tapping the power of cloud computing--without compromising security. Also in the new, all-digital InformationWeek Government supplement: To judge the success of the OMB's IT reform efforts, we need concrete numbers on cost savings and returns. Download our Cloud In Action issue of InformationWeek Government now. (Free registration require

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Bprince
50%
50%
Bprince,
User Rank: Ninja
12/31/2011 | 3:09:41 PM
re: FBI To Get More Cyber Crime Agents
For Internet policing to work, it not only takes more resources domestically but also global buy-in and cooperation. There have been a couple arrests this past year that are great examples of that.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
Partner Perspectives
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

CVE-2014-3372
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the CCM reports interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq90589.

CVE-2014-3373
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the CCM Dialed Number Analyzer interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCup92550.

CVE-2014-3374
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the CCM admin interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq90582.

CVE-2014-3375
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the CCM Service interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq90597.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.